eJPTv2 - Host & Network Penetration Testing - 5. Post-Exploitation
Focused View
8:43:16
86 View
1. Course Introduction.mp4
09:18
1. Introduction To Post-Exploitation.mp4
11:15
2. Post-Exploitation Methodology.mp4
08:48
1. Enumerating System Information.mp4
16:55
2. Enumerating Users & Groups.mp4
16:16
3. Enumerating Network Information.mp4
18:43
4. Enumerating Processes & Services.mp4
19:19
5. Automating Windows Local Enumeration.mp4
29:46
1. Enumerating System Information.mp4
21:47
2. Enumerating Users & Groups.mp4
13:50
3. Enumerating Network Information.mp4
14:11
4. Enumerating Processes & Cron Jobs.mp4
14:52
5. Automating Linux Local Enumeration.mp4
30:05
1. Setting Up A Web Server With Python.mp4
12:30
2. Transferring Files To Windows Targets.mp4
15:28
3. Transferring Files To Linux Targets.mp4
12:17
1. Upgrading Non-Interactive Shells.mp4
13:24
1. Identifying Windows Privilege Escalation Vulnerabilities.mp4
24:19
2. Windows Privilege Escalation.mp4
09:53
1. Linux Privilege Escalation - Weak Permissions.mp4
12:52
2. Linux Privilege Escalation - SUDO Privileges.mp4
10:02
1. Persistence Via Services.mp4
21:55
2. Persistence Via RDP.mp4
13:31
1. Persistence Via SSH Keys.mp4
16:04
2. Persistence Via Cron Jobs.mp4
12:23
1. Dumping & Cracking NTLM Hashes.mp4
27:20
1. Dumping & Cracking Linux Password Hashes.mp4
21:11
1. Pivoting.mp4
26:26
1. Clearing Your Tracks On Windows.mp4
25:38
2. Clearing Your Tracks On Linux.mp4
16:53
1. Course Conclusion.mp4
06:05
More details
User Reviews
Rating
average 0
Focused display
Category

INE
View courses INEINE: Expert IT Training for Networking, Cyber Security and Cloud
INE is the trusted global leader in online IT training for networking, cyber security, cloud management, and data science.
- language english
- Training sessions 31
- duration 8:43:16
- English subtitles has
- Release Date 2023/05/03